[twitter-dev] Re: OAuth vs. Basic authentication strictly on iPhone

2009-08-12 Thread Zac Bowling
Pictures in email signatures is obnoxious and annoying. Zac Bowling On Tue, Aug 11, 2009 at 2:58 PM, Bradley S. O'Hearne wrote: > Alex, > Thank you for the information -- that does give me a much better idea of the > helpful utility of OAuth within the Twitter ecosystem. Please understand, my

[twitter-dev] Re: OAuth vs. Basic authentication strictly on iPhone

2009-08-12 Thread Cameron Kaiser
> I am not aware of UIWebView and have no idea of what it does. It is, essentially, a browser object. -- personal: http://www.cameronkaiser.com/ -- Cameron Kaiser * Floodgap Systems * www.floodgap.com * ckai...@floodgap.com -- I can't complain, but sometim

[twitter-dev] Re: OAuth vs. Basic authentication strictly on iPhone

2009-08-12 Thread srikanth reddy
> > << if you choose to run a rogue executable on your computer, it isn't the > computer's fault for running it. It is the user's fault for running the > executable. >> > Exactly. It is the users fault. If all third party apps are forced to implement OAuth it would save users from this fault to s

[twitter-dev] Re: OAuth vs. Basic authentication strictly on iPhone

2009-08-11 Thread Isaiah
Why would it be hosted in your app? Why can't you open Safari? Obviously Safari is *more* trusted. But if you've already installed an untrusted app onto your machine, the untrusted app has enough power to keylog, brute force your keychain (or other password db), send personal info over

[twitter-dev] Re: OAuth vs. Basic authentication strictly on iPhone

2009-08-11 Thread Bradley S. O'Hearne
JDG, > Why would it be hosted in your app? Why can't you open Safari? The ideal usage pattern in an application is not to leave the application. Opening Safari requires exiting the current application. Opening a UIWebView within your application is the way to go. Brad On Aug 11, 2009, at

[twitter-dev] Re: OAuth vs. Basic authentication strictly on iPhone

2009-08-11 Thread JDG
Why would it be hosted in your app? Why can't you open Safari? On Tue, Aug 11, 2009 at 13:29, Bradley S. O'Hearne wrote: > Srikanth, > > By third party i meant some one like 'TwitViewer' (some one who would pay > and register their app in appstore and trick the users to believe in them > but who

[twitter-dev] Re: OAuth vs. Basic authentication strictly on iPhone

2009-08-11 Thread Bradley S. O'Hearne
Srikanth, By third party i meant some one like 'TwitViewer' (some one who would pay and register their app in appstore and trick the users to believe in them but who do not work the way they were expected to ) That's not a valid use case for faulting the authentication mechanism. The use

[twitter-dev] Re: OAuth vs. Basic authentication strictly on iPhone

2009-08-11 Thread Alex Payne
For the case of a dedicated application on a rich mobile platform like iPhone, I agree that OAuth does not offer a particularly different user experience. It does, however, provide us at Twitter the information we need to provide detailed usage analytics back to developers, as well as the data we n

[twitter-dev] Re: OAuth vs. Basic authentication strictly on iPhone

2009-08-11 Thread srikanth reddy
By third party i meant some one like 'TwitViewer' (some one who would pay and register their app in appstore and trick the users to believe in them but who do not work the way they were expected to ) <> NO. With OAuth you are not keying in your password with in the app. <> I have to agree with

[twitter-dev] Re: OAuth vs. Basic authentication strictly on iPhone

2009-08-11 Thread Bradley S. O'Hearne
Srikanth, Thank you for your thoughts -- good ones. Responses: But what if the app was developed by some thirdparty devs? you never know whether the password is stored or logged some where. I'm not sure who the "third party" is relative to -- if you are the user of an iPhone app, *every*

[twitter-dev] Re: OAuth vs. Basic authentication strictly on iPhone

2009-08-11 Thread srikanth reddy
My thoughts OAuth wasn't meant for Desktop apps. Its for third party apps (consumers) who try to request a protected resource from a service provider on behalf of end users. Typically a consumer offers one kind of service and a service provider offers a different service. As you know the advantag